Categories
Cyberinfrastructure Education Reading

Latest Read: Code of Honor

The Code of Honor: Embracing Ethics in Cybersecurity by Ed Skoudis and Dr. Paul J. Maurer.

The Code of Honor: Embracing Ethics in Cybersecurity by Paul J. Maurer and Ed Skoudis

Ed holds a BS in Electrical Engineering from the University of Michigan and a MS in Information Networking from Carnegie Mellon. Today he is the President of the SANS Technology Institute. Paul holds a M.Div.from Gordon-Conwell Theological Seminary and PhD in Political Science from Claremont Graduate University. Today he is the President of Montreat College.

I found this to be one of the most insightful books on cybersecurity and a must read for anyone in the fields of IT, AI, or IR. Jon outlines key elements for cybersecurity teams to X: Espionage (Bletchley Park), Sabotage (Stuxnet), Subversion (2016 US Election Interference), and Cyber Power (China).

It is very welcoming to see Mariano addressing machine learning for predictive cybersecurity. Mariano introduces statistical methods and machine learning easily accessible to security teams with Bayesian inference. Examples predictive detection, anomaly identification, and early warning signs is proving how AI is moving any cybersecurity program from reactive to proactive.

Mariano is including Python scripts and Jupyter-based workflows, providing technically savvy security teams a direct path to experimentation and deployment in their internal test deployments.

This book certainly provides cybersecurity teams with a practical roadmap for driving a data-driven mindset. This can be an excellent resources for organizational leaders to understand business in the age of aggressive malware and data breach announcements.

Categories
Cyberinfrastructure Education Innovation Reading

Latest Read: Data-Driven Cybersecurity

Data-Driven Cybersecurity: Reducing risk with proven metrics by Mariano Mattei.

Data-Driven Cybersecurity Reducing risk with proven metrics by Mariano Mattei

Mariano holds a Masters in Cyber Defense and Information Security from Temple University. She is the former Director Governance, Risk, and Compliance at Layer 8 Security, and CISO at Mattei. Today Mariano is VP Cybersecurity and CISO at Azzur.

It is very welcoming to see Mariano addressing machine learning for predictive cybersecurity. Mariano introduces statistical methods and machine learning easily accessible to security teams with Bayesian inference. Examples predictive detection, anomaly identification, and early warning signs is proving how AI is moving any cybersecurity program from reactive to proactive.

Mariano is including Python scripts and Jupyter-based workflows, providing technically savvy security teams a direct path to experimentation and deployment in their internal test deployments.

This book certainly provides cybersecurity teams with a practical roadmap for driving a data-driven mindset. This can be an excellent resources for organizational leaders to understand business in the age of aggressive malware and data breach announcements.

Categories
Cyberinfrastructure Education Innovation Reading

Latest Read: Age of Deception

Age of Deception: Cybersecurity As Secret Statecraft (Cornell Studies in Security Affairs) by Jon R. Lindsay.

Age of Deception: Cybersecurity as Secret Statecraft by John Lindsey

Jon holds a PhD in political science from the Massachusetts Institute of Technology and an M.S. in computer science and B.S. in symbolic systems from Stanford University. He served in the US Navy with operational assignments in Europe, Latin America, and the Middle East. Today Jon is an Associate Professor at the School of Cybersecurity and Privacy at Georgia Tech. His research explores the role of emerging technology in global security.

I found this to be certainly one of the most insightful books on cybersecurity and a must read for anyone working in the fields of IT, AI, or IR. He reveals how cybersecurity has elevated to impact national security and international relations, resulting in secret statecraft. In fact, Jon introduces the statecraft of cybersecurity by revising Espionage (Bletchley Park), Sabotage (Stuxnet), Subversion (2016 US Election Interference), and Cyber Power (China).

He begins by updating the history of espionage at Bletchley Park. This will certainly be an amazing insight to many readers who only know the Turing story or the 2014 movie The Imitation Game, of the early efforts at Bletchley Park revealing the challenges the British faced in confronting Enigma.

Categories
Artificial Intelligence Cyberinfrastructure Education Innovation Reading

Latest Read: Inside Cyber


Inside Cyber: How AI, 5G, and Quantum Computing Will Transform Privacy and Our Security by Chuck Brooks.

Inside Cyber: How AI, 5G, IoT, and Quantum Computing Will Transform Privacy and Our Security by Chuck Brooks

Chuck holds an MA from the University of Chicago. He serves as President of Brooks Consulting International addressing cybersecurity, emerging technologies and government relations. Chuck also serves as an Adjunct Professor at Georgetown University in the Cyber Risk Management Program. He has briefed the G20 on energy cybersecurity, served on two National Academy of Science Advisory groups and addressed USTRANSCOM on cybersecurity.

Chuck serves on an industry/government Working group for DHS CISA focused on security space systems. Chuck is also a contributor to Forbes, The Washington Post, Dark Reading, Homeland Security Today, and Security Information Watch.

He is providing readers a roadmap for understanding the “Fourth Industrial Revolution.” The book serves as a bridge between complex technical advancements and their practical implications for business, government, and individual privacy.

Readers will learn that society is entering a new state of ”cyberflux” where digital and physical (analog) worlds are rapidly converging. This has created new vulnerabilities yet also new opportunities. He reveals AI, 5G, and related tools offer enhanced efficiencies, empowering new business models that offer new innovations across finance, healthcare, transportation, and government. He is focusing on what they do and why they matter rather than jumping into technological formulas or programming code.

Categories
Education Innovation Reading

Latest Read: Red Team

Red Team: How to Succeed By Thinking Like the Enemy by Micah Zenko

Red Team: How to Succeed By Thinking Like the Enemy by Micah Zenko

Micah holds a BA in International Relations from University of Wisconsin-Madison, MA in Security Policy Studies at George Washington University, and PhD in Political Science from Brandeis University. He is the Director of Research and Learning at the McChrystal Group. He is also a Whitehead Senior Fellow at Chatham House and previously served as a Senior Fellow at the Council on Foreign Relations (CFR).

Micah previously served at Harvard University’s Belfer Center for Science and International Affairs, the US State Department’s Office of Policy Planning, the Brookings Institution, and the Congressional Research Service. He is published in The Atlantic, The Guardian, Foreign Policy, and Business Insider.

Red Team is in fact, a very engaging read and should be almost mandatory for organizational leaders and their IT division. The key reason in fact is that Micah is providing the practice of inhabiting the perspective of potential competitors to gain a strategic advantage.